咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 15 篇 网络空间安全
    • 14 篇 计算机科学与技术...
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 软件工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 航空宇航科学与技...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 物理学

主题

  • 30 篇 identity authent...
  • 4 篇 blockchain
  • 2 篇 iot
  • 2 篇 puf
  • 2 篇 digital signatur...
  • 1 篇 群签名
  • 1 篇 解决方案
  • 1 篇 secret sharing
  • 1 篇 blood smear dete...
  • 1 篇 cscw
  • 1 篇 firewall
  • 1 篇 quantum bit erro...
  • 1 篇 clustering
  • 1 篇 w-eap
  • 1 篇 voiceprint recog...
  • 1 篇 digital rights m...
  • 1 篇 网络技术
  • 1 篇 mobile e-commerc...
  • 1 篇 authorization st...
  • 1 篇 terminal equipme...

机构

  • 1 篇 school of engine...
  • 1 篇 college of elect...
  • 1 篇 department of in...
  • 1 篇 school of electr...
  • 1 篇 state grid jiang...
  • 1 篇 school of commun...
  • 1 篇 guangzhou lianro...
  • 1 篇 school of inform...
  • 1 篇 institute of rob...
  • 1 篇 school of comput...
  • 1 篇 ningbotech unive...
  • 1 篇 the third resear...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 school of inform...
  • 1 篇 school of inform...
  • 1 篇 state grid shang...
  • 1 篇 school of safety...
  • 1 篇 shenyang institu...
  • 1 篇 山东大学

作者

  • 1 篇 yanli ren
  • 1 篇 陈立云
  • 1 篇 chunming zou
  • 1 篇 yingjie tian
  • 1 篇 naixin kang
  • 1 篇 xin zhao
  • 1 篇 wenbing zhao
  • 1 篇 liu chong
  • 1 篇 yiping cao
  • 1 篇 wanwan wu
  • 1 篇 zhu shuren
  • 1 篇 huiyu zhou
  • 1 篇 yanli wang
  • 1 篇 林俊宏
  • 1 篇 wu zhijun
  • 1 篇 chuanjun wang
  • 1 篇 jingyong zhu
  • 1 篇 xu ning
  • 1 篇 baowu bian yan c...
  • 1 篇 mengjuan zhai

语言

  • 27 篇 英文
  • 3 篇 中文
检索条件"主题词=identity authentication"
30 条 记 录,以下是1-10 订阅
排序:
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication
收藏 引用
Chinese Physics B 2009年 第10期18卷 4105-4109页
作者: 刘文杰 陈汉武 马廷淮 李志强 刘志昊 胡文博 School of Computer Science and Engineering Southeast University School of Computer and Software Nanjing University of Information Science and Technology College of Information Engineering Yangzhou University
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit tw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
T-ATMChain:Blockchain-Based identity authentication for Air Traffic Management
收藏 引用
China Communications 2024年 第12期21卷 186-202页
作者: Lu Xin Wu Zhijun Yue Meng School of Safety Science and Engineering Civil Aviation University of ChinaTianjin 300300China School of Information Industry Shanxi College of TechnologyShanxi 036000China
The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link *** to ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Effective identity authentication Based on Multiattribute Centers for Secure Government Data Sharing
收藏 引用
Tsinghua Science and Technology 2024年 第3期29卷 736-752页
作者: Meiquan Wang Junhua Wu Tongdui Zhang Junhao Wu Guangshun Li School of Computer Science Qufu Normal UniversityRizhao 276800China Science and Technology Innovation Service Institution of Rizhao Rizhao 276800China
As one of the essential steps to secure government data sharing,identity authentication(IA)plays a vital role in the processing of large ***,the centralized IA scheme based on a trusted third party presents problems o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A CPK-Based identity authentication Scheme for IoT
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fine-Grained and Fair identity authentication Scheme for Mobile Networks Based on Blockchain
收藏 引用
China Communications 2022年 第6期19卷 35-49页
作者: Mengjuan Zhai Yanli Ren Guorui Feng Xinpeng Zhang School of Communication and Information Engineering Shanghai UniversityShanghai 200444China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou 450001HenanChina
With the popularity of the internet,users hope to better protect their privacy while obtaining network ***,in the traditional centralized authentication scheme,identity information such as the user's private key is ge... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An online identity authentication method for blood smear
收藏 引用
Journal of Innovative Optical Health Sciences 2016年 第6期9卷 1-11页
作者: Xiaozhen Feng Yiping Cao Kuang Peng Cheng Chen Department of Optical Electronics Sichuan University Chengdu Sichuan 610064P.R.China
Blood smear test is the basic method of blood cytology and is also a standard medical test that can help diagnose various conditions and *** examination is the gold stan-dard to determine pathological changes in blood... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
identity authentication Based on Sensors of Smartphone and Neural Networks
收藏 引用
Journal of Computer and Communications 2022年 第7期10卷 90-102页
作者: Jingyong Zhu Hanbing Fan Yichen Huang Miaomiao Lin Tao Xu Junqiang Cai Zhengjie Wang College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao China
The smartphone has become an indispensable electric device for most people since it can assist us in finishing many tasks such as paying and reading. Therefore, the security of smartphones is the most crucial issue to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Utilizing Certificateless Cryptography for IoT Device identity authentication Protocols in Web3
收藏 引用
ZTE Communications 2024年 第2期22卷 30-38页
作者: WU Zhihui HONG Yuxuan ZHOU Enyuan LIU Lei PEI Qingqi Guangzhou Institute of Technology Xidian UniversityGuangzhou 510700China Guangzhou Lianrong Information Technology Co.Ltd. Guangzhou 510700China The Hong Kong Polytechnic University Hong Kong 999077China
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of *** propose a protocol that offers a decentralized approach by di... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Sequence Patterns of identity authentication Protocols
收藏 引用
Journal of Southwest Jiaotong University(English Edition) 2006年 第3期14卷 205-211页
作者: 陶宏才 何大可 School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China
From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TFP). Ten feasible sequence... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Privacy Preservation of Smart Meters Based on identity authentication
Privacy Preservation of Smart Meters Based on Identity Authe...
收藏 引用
作者: Hongbo Hu Xin Zhao Yalian Wu Mengbiao Huang Ziqi Zhu Qingyu Yang College of Information Engineering Xiangtan University
Smart meters provide a lot of convenience for both power supply and consumption. Due to the frequent transmission of information, it brings great challenges to the privacy preservation of the user’s household power c... 详细信息
来源: cnki会议 评论